Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 16:42
Behavioral task
behavioral1
Sample
2024-11-20_14f5051ecc9450a95e52a1cec038cc9f_polyvice.exe
Resource
win7-20241023-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2024-11-20_14f5051ecc9450a95e52a1cec038cc9f_polyvice.exe
-
Size
10.5MB
-
MD5
14f5051ecc9450a95e52a1cec038cc9f
-
SHA1
7b3cd491f6f83250fe894b9ad55071996494182d
-
SHA256
6d61a9b4a24f4d4519b5e4de3ab3e9f1efdc67a5df1d721b1052402b1b5ea109
-
SHA512
b11b9598848ef5d0c239243202ef2f7dbe80e1ba3ede26296989a94e992cbefde744b371364f66bd84456896184128db866b8a1fb305e11520549e54595faec9
-
SSDEEP
98304:dR4XRwKR3oKDkPd4nPExkE7ttAkHA/ZN0Ri/PzGbdk4KPGIJJvGl8pI+XFwWgX4e:gXLGpSJ85qmufbZnVsY746Ax761PZaV
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 14 IoCs
Processes:
resource yara_rule behavioral2/memory/1608-3-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-4-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-5-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-6-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-7-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-8-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-9-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-11-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-12-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-13-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-14-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-15-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-16-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig behavioral2/memory/1608-17-0x00007FF62DE90000-0x00007FF62E9BC000-memory.dmp xmrig -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-11-20_14f5051ecc9450a95e52a1cec038cc9f_polyvice.exedescription pid Process Token: SeLockMemoryPrivilege 1608 2024-11-20_14f5051ecc9450a95e52a1cec038cc9f_polyvice.exe Token: SeLockMemoryPrivilege 1608 2024-11-20_14f5051ecc9450a95e52a1cec038cc9f_polyvice.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2024-11-20_14f5051ecc9450a95e52a1cec038cc9f_polyvice.exepid Process 1608 2024-11-20_14f5051ecc9450a95e52a1cec038cc9f_polyvice.exe